cc/td/doc/product/lan/cat6000/sw_5_5
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring VLANs

Configuring VLANs

This chapter describes how to configure Ethernet, Token Ring, and private VLANs on the Catalyst 6000 family switches.


Note   For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 6000 Family Command Reference publication.


Note   The Catalyst 6000 family switch 10/100 Ethernet switching modules support auxiliary VLANs. You can plug an externally powered IP phone into a 10/100 port and then add that port to an auxiliary VLAN using the set port auxiliaryvlan command. For complete details on configuring auxiliary VLANs, see "Configuring a Voice-over-IP Network."

This chapter consists of these sections:

Configuring Ethernet and Token Ring VLANs

A VLAN is a group of end stations with a common set of requirements, independent of physical location. VLANs have the same attributes as a physical LAN but allow you to group end stations even if they are not located physically on the same LAN segment.

These sections describe how VLANs work:

Understanding VLANs in a VTP Domain

VLANs allow you to group ports on a switch to limit unicast, multicast, and broadcast traffic flooding. Flooded traffic originating from a particular VLAN is only flooded out other ports belonging to that VLAN.


Note   Before you create VLANs, you must decide whether to use VTP to maintain global VLAN configuration information for your network. For complete information on VTP, see "Configuring VTP."

Figure 9-1 shows an example of VLANs segmented into logically defined networks.


Figure 9-1: VLANs as Logically Defined Networks


VLANs are often associated with IP subnetworks. For example, all the end stations in a particular IP subnet belong to the same VLAN. Traffic between VLANs must be routed. Port VLAN membership on the switch is assigned manually on a port-by-port basis. When you assign switch ports to VLANs using this method, it is known as port-based, or static, VLAN membership.

The in-band (sc0) interface of a switch can be assigned to any VLAN, so you can access another switch on the same VLAN directly without a router. Only one IP address at a time can be assigned to the in-band interface. If you change the IP address and assign the interface to a different VLAN, the previous IP address and VLAN assignment are overwritten.

You can set these parameters when you create a VLAN in the management domain:


Note   When translating from one VLAN type to another, the switch software requires a different VLAN number for each media type.

Understanding Token Ring VLANs

Two Token Ring VLAN types are supported on switches running VTP version 2:


Note   Catalyst 6000 family switches do not support ISL-encapsulated Token Ring frames.

Token Ring TrBRF VLANs

Token Ring Bridge Relay Function (TrBRF) VLANs interconnect multiple Token Ring Concentrator Relay Function (TrCRF) VLANs in a switched Token Ring network (see Figure 9-2). The TrBRF can be extended across a network of switches interconnected via trunk links. The connection between the TrCRF and the TrBRF is referred to as a logical port.


Figure 9-2: Interconnected Token Ring TrBRF and TrCRF VLANs


For source routing, the switch appears as a single bridge between the logical rings. The TrBRF can function as a source-route bridge (SRB) or source-route transparent (SRT) bridge running either the IBM or IEEE STP. If SRB is used, you can define duplicate MAC addresses on different logical rings.

The Token Ring software runs an instance of STP for each TrBRF VLAN and each TrCRF VLAN. For TrCRF VLANs, STP removes loops in the logical ring. For TrBRF VLANs, STP interacts with external bridges to remove loops from the bridge topology, similar to STP operation on Ethernet VLANs.


Caution Certain parent TrBRF STP and TrCRF bridge mode configurations can place the logical ports (the connection between the TrBRF and the TrCRF) of the TrBRF in a blocked state. For more information, see the "VLAN Configuration Guidelines" section.

For source routing, the switch appears as a single bridge between the logical rings. The TrBRF can function as an SRB or SRT bridge running either the IBM or IEEE STP. If SRB is used, duplicate MAC addresses can be defined on different logical rings.

To accommodate IBM System Network Architecture (SNA) traffic, you can use a combination of SRT and SRB modes. In a mixed mode, the TrBRF considers some ports (logical ports connected to TrCRFs) to operate in SRB mode while others operate in SRT mode.

Token Ring TrCRF VLANs

Token Ring Concentrator Relay Function (TrCRF) VLANs define port groups with the same logical ring number. You can configure two types of TrCRFs in your network: undistributed and backup.

Typically, TrCRFs are undistributed, which means each TrCRF is limited to the ports on a single switch. Multiple undistributed TrCRFs on the same or separate switches can be associated with a single parent TrBRF (see Figure 9-3). The parent TrBRF acts as a multiport bridge, forwarding traffic between the undistributed TrCRFs.


Note   To pass data between rings located on separate switches, you can associate the rings to the same TrBRF and configure the TrBRF for SRB.


Figure 9-3: Undistributed TrCRFs



Note   By default, Token Ring ports are associated with the default TrCRF (VLAN 1003, trcrf-default), which has the default TrBRF (VLAN 1005, trbrf-default) as its parent. In this configuration, a distributed TrCRF is possible (see Figure 9-4), and traffic is passed between the default TrCRFs located on separate switches provided that the switches are connected through an ISL trunk.


Figure 9-4:
Distributed TrCRF


Within a TrCRF, source-route switching forwards frames based on either MAC addresses or route descriptors. The entire VLAN can operate as a single ring, with frames switched between ports within a single TrCRF.

You can specify the maximum hop count for All-Routes and Spanning-Tree Explorer frames for each TrCRF. This limits the maximum number of hops an explorer is allowed to traverse. If a port determines that the explorer frame it is receiving has traversed more than the number of hops specified, it does not forward the frame. The TrCRF determines the number of hops an explorer has traversed based on the number of bridge hops in the route information field.

A backup TrCRF enables you to configure an alternate route for traffic between undistributed TrCRFs located on separate switches that are connected by a TrBRF, in the event that the ISL connection between the switches fails. Only one backup TrCRF for a TrBRF is allowed, and only one port per switch can belong to a backup TrCRF.

If the ISL connection between the switches fails, the port in the backup TrCRF on each affected switch automatically becomes active, rerouting traffic between the undistributed TrCRFs through the backup TrCRF. When the ISL connection is reestablished, all but one port in the backup TrCRF is disabled. Figure 9-5 illustrates the backup TrCRF.


Figure 9-5: Backup TrCRF

VLAN Default Configuration

Table 9-1 shows the default VLAN configuration.


Table 9-1: VLAN Default Configuration
Feature Default Value

Native (default) VLAN

VLAN 1

Port VLAN assignments

All ports assigned to VLAN 1

Token Ring ports assigned to VLAN 1003 (trcrf-default)

VLAN state

Enabled

MTU size

1500 bytes

4472 bytes for Token Ring VLANs

SAID value

100,000 plus the VLAN number (for example, the SAID for VLAN 3 is 100003)

Pruning eligibility

VLANs 2-1000 are pruning eligible

Default FDDI VLAN

VLAN 1002

Default FDDI NET VLAN

VLAN 1004

Default Token Ring TrBRF VLAN

VLAN 1005 (trbrf-default) with bridge number 0F

Default Token Ring TrCRF VLAN

VLAN 1003 (trcrf-default)

TrBRF STP

IBM

TrCRF bridge mode

SRB

VLAN Configuration Guidelines

Follow these guidelines when creating and modifying VLANs in your network:

Configuring Ethernet and Token Ring VLANs


Note   VLANs support a number of parameters that are not discussed in detail in this section. For complete information on the set vlan command and its parameters, refer to the Catalyst 6000 Family Command Reference publication.

These sections describe how to configure VLANs:

Creating or Modifying an Ethernet VLAN

To create a new Ethernet VLAN, perform this task in privileged mode:

Task Command

Step 1 

Create a new Ethernet VLAN.

set vlan vlan_num [name name] [said said] [mtu mtu] [translation vlan_num]

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]


Note   The default VLAN type is Ethernet; if you do not specify the VLAN type, the VLAN is an Ethernet VLAN.

This example shows how to create an Ethernet VLAN and verify the configuration:

Console> (enable) set vlan 500 name Engineering
Vlan 500 configuration successful
Console> (enable) show vlan 500
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
500  Engineering                      active    344
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
500  enet  100500     1500  -      -      -      -    -        0      0
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
Console> (enable)

To modify the VLAN parameters on an existing Ethernet VLAN, perform this task in privileged mode:

Task Command

Step 1 

Modify an existing Ethernet VLAN.

set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu] [translation vlan_num]

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]

Creating or Modifying an FDDI VLAN

To create a new FDDI VLAN, perform this task in privileged mode:

Task Command

Step 1 

Create a new FDDI or FDDI NET-type VLAN.

set vlan vlan_num [name name] type {fddi | fddinet} [said said] [mtu mtu]

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]

To modify the VLAN parameters on an existing FDDI VLAN, perform this task in privileged mode:

Task Command

Step 1 

Modify an existing FDDI or FDDI NET-type VLAN.

set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu]

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]

Creating or Modifying a Token Ring TrBRF VLAN


Note   You must enable VTP version 2 before you create Token Ring VLANs. For information on enabling VTP version 2, see "Configuring VTP."

To create a new Token Ring TrBRF VLAN, perform this task in privileged mode:

Task Command

Step 1 

Create a new Token Ring TrBRF-type VLAN.

set vlan vlan_num [name name] type trbrf [said said] [mtu mtu] bridge bridge_number [stp
{ieee | ibm}]

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]


Note   You must specify a bridge number when creating a new TrBRF.

This example shows how to create a new Token Ring TrBRF VLAN and verify the configuration:

Console> (enable) set vlan 999 name TrBRF_999 type trbrf bridge a
Vlan 999 configuration successful
Console> (enable) show vlan 999
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
999  TrBRF_999                        active    
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
999  trbrf 100999     4472  -      -      0xa    ibm  -        0      0
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
Console> (enable)
 

To modify the VLAN parameters on an existing Token Ring TrBRF VLAN, perform this task in privileged mode:

Task Command

Step 1 

Modify an existing Token Ring TrBRF-type VLAN.

set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu] [bridge bridge_number] [stp {ieee | ibm}]

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]

Creating or Modifying a Token Ring TrCRF VLAN


Note   You must enable VTP version 2 before you create Token Ring VLANs. For information on enabling VTP version 2, see "Configuring VTP."

To create a new Token Ring TrCRF VLAN, perform this task in privileged mode:

Task Command

Step 1 

Create a new Token Ring TrCRF-type VLAN.

set vlan vlan_num [name name] type trcrf [said said] [mtu mtu] {ring hex_ring_number | decring decimal_ring_number} parent vlan_num

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]


Note   You must specify a ring number (either in hexadecimal or in decimal) and a parent TrBRF VLAN when creating a new TrCRF.

This example shows how to create a Token Ring TrCRF VLAN and verify the configuration:

Console> (enable) set vlan 998 name TrCRF_998 type trcrf decring 10 parent 999
Vlan 998 configuration successful
Console> (enable) show vlan 998
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
998  TrCRF_998                        active    352     
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
998  trcrf 100998     4472  999    0xa    -      -    srb      0      0
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
998  7       7       off
Console> (enable)
 

To modify the VLAN parameters on an existing Token Ring TrCRF VLAN, perform this task in privileged mode:

Task Command

Step 1 

Modify an existing Token Ring TrCRF-type VLAN.

set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu] [ring hex_ring_num] [decring decimal_ring_num] [bridge bridge_num] [parent vlan_num]

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]

To create a backup TrCRF, assign one port on each switch that the TrBRF traverses to the backup TrCRF.

To configure a TrCRF VLAN as a backup TrCRF, perform this task in privileged mode:

Task Command

Step 1 

Configure a TrCRF VLAN as a backup TrCRF.

set vlan vlan_num backupcrf on

Step 2 

Verify the VLAN configuration.

show vlan [vlan_num]


Caution If the backup TrCRF port is attached to a Token Ring multistation access unit (MSAU), it does not provide a backup path unless the ring speed and port mode are set by another device. We recommend that you configure the ring speed and port mode for the backup TrCRF.

To specify the maximum number of hops for All-Routes Explorer frames or Spanning-Tree Explorer frames in the TrCRF, perform this task in privileged mode:

Task Command

Step 1 

Specify the maximum number of hops for All-Routes Explorer frames in the TrCRF.

set vlan vlan_num aremaxhop hopcount

Step 2 

Specify the maximum number of hops for Spanning-Tree Explorer frames in the TrCRF.

set vlan vlan_num stemaxhop hopcount

Step 3 

Verify the VLAN configuration.

show vlan [vlan_num]

This example shows how to limit All-Routes Explorer frames and Spanning-Tree Explorer frames to ten hops and how to verify the configuration:

Console> (enable) set vlan 998 aremaxhop 10 stemaxhop 10
Vlan 998 configuration successful
Console> (enable) show vlan 998
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
998  VLAN0998                         active    357
 
 
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
998  trcrf 100998     4472  999    0xff   -      -    srb      0      0
 
 
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
998  10      10      off
Console> (enable)

Assigning Switch Ports to a VLAN

A VLAN created in a management domain remains unused until you assign one or more switch ports to the VLAN. If you specify a VLAN that does not exist, the VLAN is created and the specified ports are assigned to it.


Note   Make sure you assign switch ports to a VLAN of the proper type. Assign Ethernet, Fast Ethernet, and Gigabit Ethernet ports to Ethernet-type VLANs.

To assign one or more switch ports to a VLAN, perform this task in privileged mode:

Task Command

Step 1 

Assign one or more switch ports to a VLAN.

set vlan vlan_num mod_num/port_num

Step 2 

Verify the port VLAN membership.

show vlan [vlan_num]
show port [mod_num[/port_num]]

This example shows how to assign switch ports to a VLAN and verify the assignment:

Console> (enable) set vlan 560 4/10
VLAN 560 modified.
VLAN 1 modified.
VLAN  Mod/Ports
---- -----------------------
560   4/10
      
Console> (enable) show vlan 560
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
560  Engineering                      active    348     4/10
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
560  enet  100560     1500  -      -      -      -    -        0      0
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
Console> (enable) show port 4/10
Port  Name               Status     Vlan       Level  Duplex Speed Type
----- ------------------ ---------- ---------- ------ ------ ----- ------------
 4/10                    notconnect 560        normal   half    10 10BaseT
 
<...output truncated...>
 
Last-Time-Cleared
--------------------------
Wed Jun 24 1998, 12:16:41
Console> (enable)

Mapping 802.1Q VLANs to ISL VLANs

The valid range of user-configured Inter-Switch Link (ISL) VLANs is 1-1000. The valid range of VLANs specified in the IEEE 802.1Q standard is 0-4095. In a network environment with non-Cisco devices connected to Cisco switches through 802.1Q trunks, you must map 802.1Q VLAN numbers greater than 1000 to ISL VLAN numbers.

802.1Q VLANs in the range 1-1000 are automatically mapped to the corresponding ISL VLAN. 802.1Q VLAN numbers greater than 1000 must be mapped to an ISL VLAN in order to be recognized and forwarded by Cisco switches.

These restrictions apply when mapping 802.1Q VLANs to ISL VLANs:

To map an 802.1Q VLAN to an ISL VLAN, perform this task in privileged mode:

Task Command

Step 1 

Map an 802.1Q VLAN to an ISL Ethernet VLAN. The valid range for dot1q_vlan is 1001-4095. The valid range for isl_vlan is 1-1000.

set vlan mapping dot1q dot1q_vlan isl isl_vlan

Step 2 

Verify the VLAN mapping.

show vlan mapping

This example shows how to map 802.1Q VLANs 2000, 3000, and 4000 to ISL VLANs 200, 300, and 400 and how to verify the configuration:

Console> (enable) set vlan mapping dot1q 2000 isl 200 
802.1q vlan 2000 is existent in the mapping table
Console> (enable) set vlan mapping dot1q 3000 isl 300
Vlan mapping successful
Console> (enable) set vlan mapping dot1q 4000 isl 400
Vlan mapping successful
Console> (enable) show vlan mapping
802.1q vlan     ISL vlan        Effective
------------------------------------------
2000            200             true
3000            300             true
4000            400             true
Console> (enable)

Clearing 802.1Q-to-ISL VLAN Mappings

To clear an 802.1Q-to-ISL VLAN mapping, perform this task in privileged mode:

Task Command

Step 1 

Clear an 802.1Q-to-ISL VLAN mapping.

clear vlan mapping dot1q {dot1q_vlan | all}

Step 2 

Verify the VLAN mapping.

show vlan mapping

This example shows how to clear the VLAN mapping for 802.1Q VLAN 2000:

Console> (enable) clear vlan mapping dot1q 2000
Vlan 2000 mapping entry deleted
Console> (enable)
 

This example shows how to clear all 802.1Q-to-ISL VLAN mappings:

Console> (enable) clear vlan mapping dot1q all
All vlan mapping entries deleted
Console> (enable)

Deleting a VLAN

When you delete a VLAN in VTP server mode, the VLAN is removed from all switches in the VTP domain. When you delete a VLAN in VTP transparent mode, the VLAN is deleted only on the current switch.


Caution When you delete a VLAN, any ports assigned to that VLAN become inactive. Such ports remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN.

To delete a VLAN on the switch, perform this task in privileged mode:

Task
Command

Delete a VLAN.

clear vlan vlan_num


Note   You cannot delete a Token Ring TrBRF VLAN without first reassigning its child TrCRFs to another parent TrBRF, or deleting the child TrCRFs.

This example shows how to delete a VLAN (in this case, the switch is a VTP server):

Console> (enable) clear vlan 500
This command will deactivate all ports on vlan 500
in the entire management domain
Do you want to continue(y/n) [n]?y
Vlan 500 deleted
Console> (enable)

Configuring Private VLANs

These sections describe how private VLANs work:

Software Requirements for Private VLANs

To configure private VLANs you need supervisor engine software release 5.4(1) or later and MSFC IOS software release 12.0(7)XE1 or later.

Understanding Private VLANs

A private VLAN is a set of ports that you configure to have the features of normal VLANs in addition to providing some Layer 2 isolation from other ports on the Catalyst 6000 family switch. Ports belonging to a private VLAN are associated with a common set of supporting VLANs that are used to create the private VLAN structure. Private VLANs and normal VLANs can be configured from the same Catalyst 6000 family switch.

There are three types of private VLAN ports: promiscuous, isolated, and community.

Privacy is granted at the Layer 2 level by blocking outgoing traffic to all isolated ports. All isolated ports are assigned to an isolated VLAN where this hardware function occurs. Traffic received from an isolated port is forwarded to all promiscuous ports only.

A private VLAN comprises pairs of VLANs that share a primary VLAN. Within a private VLAN, there are three distinct classifications of VLANs: a single primary VLAN, a single isolated VLAN, and a series of community VLANs.

You must define each supporting VLAN within a private VLAN structure before you can configure the private VLAN:

To create a private VLAN, you assign two or more normal VLANs in the normal VLAN range: one VLAN is designated as a primary VLAN, a second VLAN is designated as an isolated VLAN, and potentially, additional VLANs are designated as community VLANs. After designating the VLANs, you must bind them together and associate them to the promiscuous port.

Private VLANs can be extended across multiple Ethernet switches by trunking the primary, isolated, and any community VLANs to other switches that support private VLANs.

In an Ethernet-switched environment where it is desirable to have Layer 2 isolation between individual or groups of stations, you can assign an individual VLAN and associated IP subnet to each individual or common group of stations. In many environments, the servers only require the ability to communicate with a default gateway to gain access to end points outside the VLAN itself. By incorporating these stations, regardless of ownership, into one private VLAN, you achieve these benefits:

On a Multilayer Switch Feature Card (MSFC) port or a nontrunk promiscuous port, you can remap as many community VLANs as desired; however, while a nontrunk promiscuous port can remap to only one primary VLAN, an MSFC port does not have this limitation. Another difference between the two types of promiscuous ports, is that an MSFC port can only connect an MSFC router, while with a nontrunk promiscuous port you can connect a wide range of devices as "access points" to a private VLAN. For example, you can connect a nontrunk promiscuous port to the "server port" of a LocalDirector to remap a number of community VLANs to the server VLAN so that the LocalDirector can load balance the servers present in the communities, or you can use a nontrunk promiscuous port to monitor and/or back up all the private VLAN servers from an administration workstation.

Private VLAN Configuration Guidelines

This section contains configuration guidelines for private VLANs:

  If you attempt such a configuration, a warning message displays and the command is rejected.

Table 9-2:
Module Number Description Ports by ASIC

WS-X6224-100FX-MT

24-port 100FX Multimode MT-RJ

Ports 1-12

Ports 13-24

Ports 25-36

Ports 37-48

WS-X6248-RJ-45

48-port 10/100TX RJ-45

Ports 1-12

Ports 13-24

Ports 25-36

Ports 37-48

WS-X6248-TEL

48-Port 10/100TX RJ-21

Ports 1-12

Ports 13-24

Ports 25-36

Ports 37-48

WS-X6348-RJ-45

48-port 10/100TX RJ-45

Ports 1-12

Ports 13-24

Ports 25-36

Ports 37-48

WS-X6024-10FL-MT

24-port 10BaseFL MT-RJ

Ports 1-12

Ports 13-24

Modules with Ports Listed by ASIC Groups

Creating a Private VLAN

To create a private VLAN, perform this task in privileged mode:

Task Command

Step 1 

Create the primary VLAN.

set vlan vlan_num pvlan-type primary

Step 2 

Set the isolated or community VLAN(s).

set vlan vlan_num pvlan-type {isolated | community}

Step 3 

Bind the isolated or community VLAN(s) to the primary VLAN.

set pvlan primary_vlan_num {isolated_vlan_num | community_vlan_num}

Step 4 

Associate the isolated or community port(s) to the private VLAN.

set pvlan primary_vlan_num {isolated_vlan_num | community_vlan_num} mod/ports

Step 5 

Map the isolated/community VLAN to the primary VLAN on the promiscuous port.

set pvlan mapping primary_vlan_num {isolated_vlan_num | community_vlan_num} mod/ports

Step 6 

Verify the private VLAN configuration.

show pvlan [vlan_num]

show pvlan mapping


Note   As a shortcut, you can bind the isolated or community port(s) and associated isolated or community port(s) to the private VLAN in one step using the set pvlan primary_vlan_num {isolated_vlan_num | community_vlan_num} mod/port command.


Note   Ports do not have to be on the same switch as long as the switches are trunk connected and the private VLAN has not been removed from the trunk.


Note   If you are using the MSFC for your promiscuous port in your private VLAN, use 15/1 as the MSFC mod/port number if the supervisor engine is in slot 1, or use 16/1 if the supervisor engine is in slot 2.

This example shows how to create a private VLAN using VLAN 7 as the primary VLAN, 901 as the isolated VLAN, and 902 and 903 as the community VLANs. VLAN 901 uses module 4, port 3.
VLAN 902 uses module 4, ports 4 through 6. VLAN 903 uses module 4, ports 7 through 9.

This example shows how to specify VLAN 7 as the primary VLAN:

Console> (enable) set vlan 7 pvlan-type primary
Vlan 7 configuration successful
Console> (enable)                 
 

This example shows how to specify VLAN 901 as the isolated VLAN and VLANs 902 and 903 as community VLANs:

Console> (enable) set vlan 901 pvlan-type isolated
Vlan 901 configuration successful
Console> (enable) set vlan 902 pvlan-type community
Vlan 902 configuration successful
Console> (enable) set vlan 903 pvlan-type community
Vlan 903 configuration successful
Console> (enable) 
 

This example shows how to bind VLAN 901 to primary VLAN 7 and assign port 4/3 as the isolated port:

Console> (enable) set pvlan 7 901 4/3
Successfully set the following ports to Private Vlan 7,901: 4/3
Console> (enable)                      
 

This example shows how to bind VLAN 902 to primary VLAN 7 and assign ports 4/4 through 4/6 as the community port:

Console> (enable) set pvlan 7 902 4/4-6
Successfully set the following ports to Private Vlan 7,902:4/4-6
Console> (enable)
 

This example shows how to bind VLAN 903 to primary VLAN 7 and assign port 4/7 through 4/9 as the community ports:

Console> (enable) set pvlan 7 903
Successfully set association between 7 and 903.
Console> (enable) set pvlan 7 903 4/7-9
Successfully set the following ports to Private Vlan 7,903:4/7-9
Console> (enable)
 

This example shows how to map the isolated/community VLAN to the primary VLAN on the promiscuous port, 3/1, for each isolated or community VLAN:

Console> (enable) set pvlan mapping 7 901 3/1
Successfully set mapping between 7 and 901 on 3/1
Console> (enable) set pvlan mapping 7 902 3/1
Successfully set mapping between 7 and 902 on 3/1
Console> (enable) set pvlan mapping 7 903 3/1
Successfully set mapping between 7 and 903 on 3/1
 

This example shows how to verify the private VLAN configuration:

Console> (enable) show vlan 7 
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
7    VLAN0007                         active    35      4/4-6
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
7    enet  100010     1500  -      -      -      -    -        0      0
VLAN DynCreated  RSPAN
---- ---------- --------
7    static     disabled
VLAN AREHops STEHops Backup CRF 1q VLAN
---- ------- ------- ---------- -------
Primary Secondary Secondary-Type    Ports
------- --------- ----------------- -----------------
7       901        Isolated          4/3
7       902        Community         4/4-6
7       903        Community         4/7-9
 
Console> (enable) show vlan 902
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
902  VLAN0007                         active    38      4/4-6
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
7    enet  100010     1500  -      -      -      -    -        0      0
VLAN DynCreated  RSPAN
---- ---------- --------
7    static     disabled
VLAN AREHops STEHops Backup CRF 1q VLAN
---- ------- ------- ---------- -------
Primary Secondary Secondary-Type    Ports
------- --------- ----------------- -----------------
7       902       Isolated          4/4-6
 
Console> (enable) show pvlan 
Primary Secondary Secondary-Type Ports
------- --------- -------------- ------------
7       901       isolated       4/3
7       902       community      4/4-6
7       903       community      4/7-9                  
 
Console> (enable) show pvlan mapping
Port  Primary  Secondary
----- -------- ----------
3/1    7        901-903
Console> (enable) show port
Port  Name               Status     Vlan       Duplex Speed Type
----- ------------------ ---------- ---------- ------ ----- ------------
...truncated output...
 4/3                     notconnect 7,901       half   100 100BaseFX MM
 4/4                     notconnect 7,902       half   100 100BaseFX MM
 4/5                     notconnect 7,902       half   100 100BaseFX MM
 4/6                     notconnect 7,902       half   100 100BaseFX MM
 4/7                     notconnect 7,903       half   100 100BaseFX MM
 4/8                     notconnect 7,903       half   100 100BaseFX MM
 4/9                     notconnect 7,903       half   100 100BaseFX MM
... truncated output...

Deleting a Private VLAN

You can delete a private VLAN by deleting the primary VLAN. If you delete a primary VLAN, all bindings to the primary VLAN are broken, all ports in the private VLAN become inactive, and any related mappings on the promiscuous port(s) are deleted.

To delete a private VLAN, perform this task in privileged mode:

Task
Command

Delete a primary VLAN.

clear vlan primary_vlan

This example shows how to delete primary VLAN 7:

Console> (enable) clear vlan 7
This command will de-activate all ports on vlan 7
Do you want to continue(y/n) [n]?y
Vlan 7 deleted
Console> (enable) 

Deleting an Isolated or Community VLAN

If you delete an isolated or community VLAN, the binding with the primary VLAN is broken, any isolated or community ports associated to the VLAN become inactive, and any related mappings on the promiscuous port(s) are deleted.

To delete a VLAN on the switch, perform this task in privileged mode:

Task
Command

Delete an isolated or community VLAN.

clear vlan {isolated_vlan_num | community_vlan_num}

This example shows how to delete the community VLAN 902:

Console> (enable) clear vlan 902
This command will de-activate all ports on vlan 902
Do you want to continue(y/n) [n]?y
Vlan 902 deleted
Console> (enable) 

Deleting a Private VLAN Mapping

If you delete the private VLAN mapping, the connectivity breaks between the isolated or community ports and the promiscuous port. If you delete all the mappings on a promiscuous port, the promiscuous port becomes inactive. When a private VLAN port is set to inactive, it displays "pvlan-" as its VLAN number in the show port output.

A private VLAN port might be set to inactive for the following reasons:

To delete a port mapping from a private VLAN, perform this task in privileged mode:

Task
Command

Delete the port mapping from the private VLAN.

clear pvlan mapping primary_vlan {isolated | community} {mod/ports}

This example shows how to delete the mapping of VLAN 902 to 901, previously set on ports 3/2 through 3/5:

Console> (enable) clear pvlan mapping 901 902 3/2-5
Successfully cleared mapping between 901 and 902 on 3/2-5
Console> (enable)


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Aug 28 10:28:40 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.